Analysis
-
max time kernel
139s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 04:26
Behavioral task
behavioral1
Sample
d91282ff6313f80d6892774e253f0f1d75d4371aecd4f1590837e3513e6da8d4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d91282ff6313f80d6892774e253f0f1d75d4371aecd4f1590837e3513e6da8d4.dll
Resource
win10v2004-20220812-en
General
-
Target
d91282ff6313f80d6892774e253f0f1d75d4371aecd4f1590837e3513e6da8d4.dll
-
Size
56KB
-
MD5
6323fa9ae01dfc9a28e3511c2fd85978
-
SHA1
b0914d577d21c4edf33a96e06664193438b0c24f
-
SHA256
d91282ff6313f80d6892774e253f0f1d75d4371aecd4f1590837e3513e6da8d4
-
SHA512
670492c0270259ad9eaa61d8966c220c4ec59134f818c895ae3d7b58c1ab7581a8dc79829a5841380cbe1c65434380e0a9a25941af35dd01fa55911bf118e9f6
-
SSDEEP
768:op1VqVQwL6diO9DnPHjRui6BKKFXr1EfSqZPJf54bNfF1CGm4AkyFOOJK6d1b9vz:ob8Vwn/RY6PF5gNTS4Ako1xLwGx4mhr
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 716 wrote to memory of 1264 716 rundll32.exe 81 PID 716 wrote to memory of 1264 716 rundll32.exe 81 PID 716 wrote to memory of 1264 716 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d91282ff6313f80d6892774e253f0f1d75d4371aecd4f1590837e3513e6da8d4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d91282ff6313f80d6892774e253f0f1d75d4371aecd4f1590837e3513e6da8d4.dll,#12⤵PID:1264
-